1 s2.0 S0020025523012185 Main
1 s2.0 S0020025523012185 Main
1 s2.0 S0020025523012185 Main
PII: S0020-0255(23)01218-5
DOI: https://doi.org/10.1016/j.ins.2023.119633
Reference: INS 119633
Please cite this article as: H. Szczepaniuk, E. Karolina Szczepaniuk, Cryptographic Evidence-Based
Cybersecurity for Smart Healthcare Systems, Information Sciences (2023), doi: https://doi.org/10.1016/j.ins.
2023.119633
This is a PDF file of an article that has undergone enhancements after acceptance, such as the addition of a cover
page and metadata, and formatting for readability, but it is not yet the definitive version of record. This version
will undergo additional copyediting, typesetting and review before it is published in its final form, but we are
providing this version to give early visibility of the article. Please note that, during the production process, errors
may be discovered which could affect the content, and all legal disclaimers that apply to the journal pertain.
b Polish Air Force University, Dywizjonu 303 no. 35 ST., 08-521 Dęblin, Poland
Abstract
1. Introduction
1
Designing IoMT systems supporting medical processes is a challenge on many levels.
SHSs generate Electronic Health Records (EHRs) that must be stored securely and processed
efficiently. The literature shows that EHR systems are one of the most important requirements
for doctors and hospitals [19]. EHRs include data obtained from the implementation of
various medical processes, e.g., clinical tests, ultrasound, cardiac electrocardiography, x-rays,
laboratory tests, measurements made by wearable monitoring devices, health applications,
medication history, treatment strategies, and diagnosed disease entities (see e.g., [41]). The
presented examples meet the definitional attributes of Big Data. Furthermore, SHS services
require real-time processing and continuous updating of patient data.
Nowadays, the issues of cyber security and its increasing complexity are major
concerns in organizations [12]. Since EHRs involve sensitive data, confidentiality and privacy
must be protected [36]. Ensuring the security of medical data and supporting the
interoperability of systems are other key requirements for the development of SHSs. IoMT
systems can generate many vulnerabilities and be exposed to many threats (see e.g., [44]).
The well-established theory available in ISO/IEC 27001 can be used to define the basic
information security requirements for SHSs. It is widely accepted that the key attributes of
information security are confidentiality, integrity and availability. It should be noted that IoT
systems based on a centralized architecture generate many vulnerabilities for the listed
information security attributes.
Zhou et al. [50] points out that traditional computer platforms cannot effectively
support the electronic processing of medical record data. Moreover, Huang et al. [10] rightly
note that centralized management requires large servers and backups, and query system
performance degrades over time. However, the centralized IoMT architecture can be
contrasted with the blockchain concept based on decentralized, distributed and cryptographic
proof rather than trust. The implementation of blockchain in SHSs brings an opportunity to
improve the cybersecurity of medical processes. In addition, literature analysis shows the
many benefits of integrating blockchain and Big Data technologies. The advantages of such
integration include: increasing data security, improving data integrity, preventing fraud,
supporting real-time data processing, improving data sharing, increasing Big Data quality, and
improving data access [3].
Research findings recently published by Zhao et al. [49] indicate that blockchain is a
promising alternative for the secure storage and management of medical data. The paper
demonstrates improving the cybersecurity of SHSs by implementing cryptosystem techniques
and a blockchain platform to protect sensitive medical data [49]. In particular, the proposed
solution uses Brooks Iyengar Quantum Byzantine Blockchain Networking (BIQBA-BCN)
and presents an authentication system based on the Okamoto Uchiyana Cryptosystem [49].
In this article, we used an extended approach that refers to international strategies for
developing Smart Healthcare Systems, ensuring cybersecurity of medical data, and
interoperability of systems. The article presents a multi-level architecture for the
implementation of cryptographic proof of smart contracts in SHSs.
2
medical data processing.
2. We introduce an open data exchange format for EHRs stored in the blockchain, based
on a nested tree structure and the DOM interface. As a result, cross-platform data
exchange formats such as JSON and XML can be utilized for generating EHRs.
Consequently, this promotes interoperability of SHSs and the universality of EHRs
transformations from a programming perspective.
3. We present algorithms for creating, executing and validating smart contracts for
processing medical data contained in EHRs. The algorithms presented in pseudocode
implement digital contracts between selected system actors: the patient, the doctor,
and the pharmacy.
4. We present the results of empirical tests of the proposed architecture to assess stability
and performance.
5. The proposed solutions were subject to cybersecurity assessment regarding threat and
vulnerability analysis using the risk assessment method. Steps recommended by
ENISA and elements of the methodology developed by NIST were used to develop a
strategy for minimizing the identified threats and vulnerabilities.
The next sections of this article are organized as follows. Section 2 discusses the
methodology adopted in the research with reference to international strategies for the
development of smart healthcare. Section 3 defines a layered technology stack architecture for
IoT systems in smart healthcare. Section 4 examines consensus algorithms for their
implementation in SHSs. Section 5 presents the framework for the technical implementation
of blockchain in SHSs, taking into account the system’s architecture, medical data processing
procedures, access control matrix, interoperable format of EHRs, as well as algorithms for
creating, executing, and validating smart contracts established among the system’s actors.
Section 6 describes the test environment, empirical testing methodology, and stability and
performance results. Section 7 provides a cybersecurity analysis of the proposed architecture.
Section 8 discusses the research results. The paper ends with conclusions that summarize the
research carried out.
2. Research methodology
Liberate data sources to clarify that patients are Development of mechanisms enabling safe and free
the ultimate owners of their clinical data. access to medical data using a cryptographic proof.
Integration of medical data repositories through Blockchain network as an environment for medical
data standards and infrastructure. data repositories.
3
Interoperability requirements at the global level. Ensuring interoperability in data exchange and
services using APIs.
Developing standards for data quality, Blockchain cybersecurity assessment for SHSs.
reliability, and cybersecurity.
Improving interoperability by supporting open Development of an open format for health data in
exchange formats. nested tree notation.
Taking into account the main objective of the study and the recommendations
presented in Table 1, the following specific objectives were defined:
Development of the IoMT technology stack, taking into account the requirements of
cybersecurity, interoperability and Big Data.
Analysis of consensus algorithms for blockchain implementation in SHSs.
Development of the technical architecture for the implementation of blockchain
technology in SHSs.
Development of an open data exchange format for EHRs in the blockchain network.
Implementation of smart contract algorithms for concluding, approving and validating
transactions between stakeholders of medical processes.
Software development and empirical testing.
Cybersecurity assessment of the presented concept in terms of identifying threats,
vulnerabilities, and risk analysis.
Pseudocode programming and the access control matrix method were used to define
the smart contract algorithms. The analysis of blockchain cybersecurity in healthcare was
based on the risk analysis method. The study refers to the steps recommended by ENISA and
elements of the methodology developed by NIST.
Most SHSs are based on the IoT concept. The analysis of scientific studies shows that
the most popular is the layered approach to modeling the IoT architecture. The literature
review found the following solutions:
Three-layer model – the most general model includes the sensing, transportation, and
application layers (see e.g., [43]).
4
Four-layer model – introduces an additional layer of system security support through
the implementation of confirmation mechanisms (see e.g., [14]).
Five-layer model – includes the perception, transportation, processing, and business
layers. An additional processing layer is responsible for processing the data received
from the perception layer through the transport layer. The business layer handles the
business logic of the IoT system (see e.g., [32]).
Multi-component model – involves the systemic decomposition of a five-layer model
into a multi-component architecture based on the definition of a computer system
constituting a collaborative hardware and software system [39].
It should be noted that these are not the only IoT architecture models available in the
literature. Recently, the IEEE 2413-2019 standard has been available, which defines the IoT
architecture framework in accordance with the ISO/IEC/IEEE 42010 standard. Two standards
are particularly relevant: the IEEE P2413.1 Standard for Reference Architecture for Smart
Cities (RASC) and the IEEE P2413.2 Standard for Reference Architecture for IoT Power
Distribution (PDIOT). The IEEE P2413.1 standard promotes the Smart City concept based on
cross-domain interactions and semantic interoperability [11]. The Smart City concept
encompasses an Intelligent Operation Center (IOC) based on cloud computing and edge
computing technology, which facilitates city management thanks to the knowledge derived
from IoT and Big Data [11].
Currently, a new term “Internet of Medical Things” appears in the literature. Aman et
al. [2], referring to the IEEE P2413.1 standard, characterized a four-layer IoMT architecture,
which consists of layers of devices, network communication, platform and applications.
Various IoMT architecture models are available in the literature, but most concepts are based
on a layered approach. For example, Lu [16] presented a three-layer model that includes the
application, perception, and network protocol layers. Swarna Priya et al. [37] defined an IoT
technical architecture for implementing intrusion detection techniques.
It should be noted that regardless of the approach used, the following key research
areas can be distinguished in IoMT systems:
To achieve our research goals, we propose to extend the layered IoMT model towards
cybersecurity and medical data processing. The proposed layer model is shown in Figure 1.
5
PARTICIPANTS OF MEDICAL PROCESSES
Patients Doctors Medical Staff Insurance Companies Pharmacies Other IoMT
systems
- Service Oriented Architecture (SOA)
- Application Programming Interface (API)
INTERFACE
- Representational State Transfer (REST)
LAYER - Simple Object Access Protocol (SOAP)
- Fast Healthcare Interoperability Resources (FHIR)
REQUIREMENTS
- Blockchain
- Hospital Devices
MEDICAL - Clinical Grade Wearables
DEVICES - Remote Patient Monitoring Devices
LAYER - Intelligent Ambulance Navigation Systems
- Smart Pills
The above concept includes a technology stack of SHSs. The presented model
includes five stacked layers and a vertical layer of cybersecurity requirements. All layers must
comply with cybersecurity requirements. In the presented model, each layer has the following
specificity and functionality:
Interface layer – provides an access interface for all participants of medical processes
and other IoMT systems. The primary task of the layer is to ensure interface
compatibility with other IoMT systems. The layer supports the interoperability of
digital health services. In order to implement the interoperability paradigm, the IoMT
infrastructure can be based on a service-oriented architecture (SOA). Business logic
modeling using atomized and cooperative access services facilitates the design,
development, implementation and management of IoMT system infrastructure. SOA is
related to web services and cross-platform data exchange formats (e.g., XML).
Information exchange within SOA-oriented services can be implemented based on
SOAP (Simple Object Access Protocol) and WSDL (Web Services Description
Language). The interoperability of SHSs can be supported synergistically by
6
implementing an application programming interface (API) based on the REST
architecture. The API defines a set of development rules for how users and other
systems can communicate with SHS and how to access resources. The API defines a
set of programming rules for how users and other systems can communicate with
SHSs and how to access resources. The REST API does not require the application
calling the service to use a specific programming language [46]. An alternative
approach is the FHRI (Fast Healthcare Interoperability Resources) standard, which
describes the rules for exchanging Electronic Medical Records. FHRI is based on the
REST API architecture and supports XML, JSON, ND-JSON, and RDF data exchange
formats (see e.g., [30]).
Data analysis layer – provides automated processing of Big Data obtained from the
lower layers of the model. The layer is responsible for supporting diagnostic
processes, monitoring the patient’s condition, and automating all activities related to
the handling of medical processes. The layer is responsible for supporting diagnostic
processes, monitoring the patient’s condition and automating medical processes. The
latest research results demonstrate the effectiveness of using artificial intelligence
methods, such as deep networks (see e.g., [4]), as well as ensemble classifiers and
weighting algorithms (see e.g., [48]), in supporting medical processes. AI methods
have shown particular effectiveness in counteracting the COVID-19 pandemic (see
e.g., [13]). On the other hand, it should be noted that the latest research raises a
legitimate question about the reliability of artificial intelligence applications in critical
domains (see e.g., [22]).
Data storage layer – provides a manageable space for storing electronic medical data.
Depending on the solution, the layer implements a different degree and form of data
structuring, which results from the data model used in the selected Database
Management System (DBMS). The classic approach is based on relational databases,
where the advantages are the integrity and formalization of the data model. It is
postulated that with the increasing volume and variety of digital health records,
relational databases are not always adequate (see e.g., [41]). For this reason, business
and science are increasingly focusing on NoSQL databases. NoSQL databases include
various DMBSs and data models. The main advantages of NoSQL solutions include
the flexibility of the data model, the ability to adapt the data schema to the structure of
medical records, and the speed of database querying. NoSQL databases include, but
are not limited to, document-oriented solutions that store information in JSON or
BSON format. The document structure of the schema enables its flexible adaptation to
dynamically changing data sets during the implementation of medical processes. The
document-oriented data schema enables its flexible adaptation to the dynamically
changing data structure during the implementation of medical processes. Graph
databases enable modeling of data structures based on the mathematical concept of a
directed graph. The most important advantages of graph databases are the speed of
data querying and an additional layer of semantics enabling freely modeled
relationships between graph nodes. In contrast, key-value databases store data in a
hash table containing a set of keys and values.
Transport layer – provides data transmission from the medical device layer to the
upper layers. Data transmission in IoMT systems is not limited to a specific
architecture or transmission medium and is based mainly on the TCP/IP protocol stack
and the ISO/OSI model. However, in order to fully realize the potential of IoMT
systems, next-generation networking solutions must be developed. Information-
Centric Networking (ICN) is a new communication paradigm (see e.g., [17]). The ICN
concept is based on an information-oriented architecture rather than a host-oriented
7
architecture. This assumption is in line with the development of IoT and IoMT
systems. In addition, energy-efficient wireless transmission media are crucial. The
leading wireless communication technologies are LoRaWAN, NB-IoT, LTE-M and
5G networks.
Medical device layer – supports IoMT end devices, sensors and wearable devices that
enable the implementation of medical processes.
Cybersecurity requirements – define the security guidelines for medical data at every
stage of medical processes and for all layers of the stack. Ensuring the cybersecurity
of medical processes requires taking into account the attributes of confidentiality,
availability and integrity.
The presented layered architecture is the basis for further research and is a component
of SHSs.
The project was released with the open-source Bitcoin Core software, available under
the MIT license. The presented architecture was designed for digital payment transactions, but
its innovation attracted the attention of science and business. Over the last decade, many
theoretical studies and practical implementations based on blockchain technology have been
created, especially in Industry 4.0 (see e.g., [5]). Blockchain is considered a promising
solution to issues related to secure storage, data sharing, trusted network control, and asset
management [45]. The variety of applications has led blockchain technology to evolve
towards new concepts, algorithms and software architectures. Since there are no trusted third
parties in blockchain networks, consensus algorithms are used to ensure transaction security.
The most popular consensus algorithms in blockchain networks are Proof-of-Work (PoW)
and Proof-of-Stake (PoS).
8
4.1. Proof-of-Work
Currently, the PoW algorithm is the most widely used consensus mechanism in
consensus-based blockchain networks. PoW algorithms use hardware resources (CPU, GPU,
and ASIC) to generate hash functions for blocks until a valid solution is found. The chance of
finding the correct solution increases in direct proportion to the computing power. The
mathematical concept of the hash function prevents the reverse operation of obtaining input
data from the resulting hash. Using the hash function (e.g., SHA-256) enables
computationally inexpensive integrity verification. It should be noted that as the number of
nodes in the network increases, finding the correct solution for a block becomes more
difficult.
The main disadvantage of the PoW protocol is the high power consumption, which
increases in proportion to the number of nodes in the blockchain network.
4.2. Proof-of-Stake
Proof-of-Stake protocols assume that blocks and transactions are validated based on
the stakes of participating nodes [29]. The node selection algorithm takes into account many
factors. The main factor is the size of the node’s participation in the blockchain. Node
promotion is based on the declared stake value. This assumption creates the risk that PoS
algorithms may favor selected nodes. Therefore, some PoS algorithms implement fairer node
selection methods. The following methods are used in practice [29]:
Randomized Block Selection – the algorithm selects nodes based on the hash value and
size of the node's share in the blockchain.
Coin Age Selection – the algorithm selects nodes based on the declared stake and the
time the node maintains it.
The main advantage of PoS algorithms is energy efficiency. Nodes do not need to use
computational resources to execute complex algorithms. The main disadvantage is the threat
of network centralization. Therefore, the security of PoS algorithms comes from the number
of nodes that hold a copy of all blocks.
Delegated Proof-of-Stake algorithms are an extension of the PoS protocol and are
designed to improve the efficiency and fairness of selecting nodes responsible for committing
new blocks. The basic assumption of DPoS is to guarantee network security by delegates
elected in a voting procedure from other network nodes (stakeholders). Delegates elected by
voting are responsible for approving blocks and ensuring consensus within the network.
Similar to the PoS protocol, the algorithm takes into account the size of the node’s share in
9
the blockchain and the stake that affects the voting power. The main advantage of DPoS
algorithms is the implementation of democratic mechanisms. The main limitation is the threat
of malicious nodes in case of insufficient incentive to vote.
Nick Szabo presented the concept of smart contracts in the 1990s as a method that
enables the secure implementation of digital contracts between communication parties in
computer systems [38]. In a blockchain network, smart contracts are described by
programming code that defines a set of rules enforceable by nodes. In the theory of computer
networks, smart contracts in blockchain networks can be seen as secure and trusted distributed
protocols for the enforcement of procedures defined in contracts. The programming code that
executes digital contracts is executed automatically when certain conditions are met.
saving the content of contracts in blocks – smart contracts are included in approved
blocks for which the network has reached a consensus;
distributed orientation – smart contracts can replicate to all nodes in the network;
automation – tasks are performed automatically after meeting the conditions contained
in the contract;
no modification possible – the blockchain guarantees that the terms of the contract
contained in smart contracts will remain unchanged.
The following assumptions were made when designing the blockchain implementation
framework in SHSs:
10
Table 2. Processing procedures for Electronic Health Rectors
11
Insurance companies Pharmacies Other SHS
Doctors
Smart Contract 1: Issuing a prescription Medical staff
Patients
API Hospital
Smart Contract 3: Data exchange
REST
12
and non-repudiation rules that secure the transactions of medical process stakeholders.
Distributed blockchain – a blockchain network storing EHRs generated during
medical processes.
Network securing nodes – computer systems securing the network in terms of
transaction validation and generation of new blocks based on consensus algorithms.
In the next step, the presented architecture will be detailed with technical issues
regarding the structure of EHRs, smart contract algorithms and transactions between
stakeholders of medical processes.
In order to implement the SHS architecture shown in Figure 2, the EHR is defined as
follows:
key:
𝑀𝑒𝑡𝑎𝑑𝑎𝑡𝑎 – a nested subtree describing the metadata of the EHR. The subtree is
defined as 𝑀𝑒𝑡𝑎𝑑𝑎𝑡𝑎→〈 𝐴𝑐𝑐𝑒𝑠𝑠 𝑟𝑖𝑔ℎ𝑡𝑠, 𝐼𝐷 〉. 𝐴𝑐𝑐𝑒𝑠𝑠 𝑝𝑟𝑖𝑣𝑖𝑙𝑎𝑔𝑒𝑠 is described as a
subset of the Cartesian product determined on the set of system stakeholders 𝑆 =
{𝑠1,…,𝑠𝑛} and the set of data access rights 𝑅 = {𝑟1,…,𝑟𝑛}, such that
𝐴𝑐𝑐𝑒𝑠𝑠 𝑟𝑖𝑔ℎ𝑡𝑠 ⊆ 𝑆 × 𝑅. Each ordered pair (𝑠𝑛,𝑟𝑛) defines a single access level for a
given stakeholder. In the JSON notation, the set of access rights to medical data will
be contained in a one-dimensional table 𝐴 [𝑎1,…,𝑎𝑛].
𝐵𝑙𝑜𝑐𝑘𝑐ℎ𝑎𝑖𝑛 𝑑𝑎𝑡𝑎 – a nested subtree describing the block header data in the
blockchain. The subtree is defined as 𝐵𝑙𝑜𝑐𝑘𝑐ℎ𝑎𝑖𝑛 𝑑𝑎𝑡𝑎→
〈 𝐵𝑜𝑐𝑘 ℎ𝑎𝑠ℎ, 𝑃𝑟𝑒𝑣𝑖𝑜𝑢𝑠 ℎ𝑎𝑠ℎ, 𝑇𝑖𝑚𝑒𝑠𝑡𝑎𝑚𝑝 〉. 𝐵𝑜𝑐𝑘 ℎ𝑎𝑠ℎ contains a unique
“fingerprint” for a given block generated using a cryptographic hash function and
digital signatures according to a block generation algorithm. 𝑃𝑟𝑒𝑣𝑖𝑜𝑢𝑠 ℎ𝑎𝑠ℎ contains
a unique “fingerprint” for the previous block in the blockchain. 𝑇𝑖𝑚𝑒𝑠𝑡𝑎𝑚𝑝 contains
information about the block creation time.
𝐻𝑒𝑎𝑙𝑡ℎ𝑐𝑎𝑟𝑒 𝑑𝑎𝑡𝑎– a nested subtree describing collections of medical data. The
subtree is defined as 𝐻𝑒𝑎𝑙𝑡ℎ𝑐𝑎𝑟𝑒 𝑑𝑎𝑡𝑎→ 〈 𝑃𝑎𝑡𝑖𝑒𝑛𝑡 𝐼𝐷, 𝐷𝑜𝑐𝑡𝑜𝑟 𝐼𝐷, 𝐶𝑙𝑖𝑛𝑖𝑐𝑎𝑙 𝑑𝑎𝑡𝑎 〉.
𝑃𝑎𝑡𝑖𝑒𝑛𝑡 𝐼𝐷 contains the unique identifier of the patient. 𝐷𝑜𝑐𝑡𝑜𝑟 𝐼𝐷 contains the
identifier of the doctor responsible for implementing medical procedures.
𝐶𝑙𝑖𝑛𝑖𝑐𝑎𝑙 𝑑𝑎𝑡𝑎 is the next nested subtree that contains the medical data collection for
13
transactions added to the blockchain during medical process execution.
Figure 3 shows the EHR model in a nested tree structure based on the DOM interface.
Figure 3. Model of the EHR in a nested tree structure based on the DOM interface.
Any EHR defined in a general way according to the formula (1) can be converted to
the form described by the DOM interface to specify the detailed structure of the document in
XML and JSON format. The framework structure of EHRs in XML and JSON formats is
presented in the following documents.
2 <metadata>
3 <access_rights type=”array”>
6 </access_rights>
7 <document_id> … </document_id>
8 </metadata>
9 <blockchain_data>
14
11 <previous_hash> hash function output </previous_hash>
13 </blockchain_data>
14 <healthcare_data>
15 <doctor_id> … </doctor_id>
16 <patient_id> … </patient_id>
17 <clinical_data> … </clinical_data>
18 </healthcare_data >
19
</xml>
2 metadata: {
4 document_id: “…” }
5 },
6 blockchain_data: {
11 },
12 healthcare_data: {
13 doctor_id: “…”,
14 patient_id: “…”,
15 clinical_data: { … }
16 }
15
17
}
Both XML and JSON formats are independent of programming languages and enable
compatible data exchange between different healthcare systems. From a programming
perspective, JSON and XML formats support value validation and mapping data structures to
programming objects.
The universality of the access console matrix enables the transformation and decomposition
of access rights to notations adopted by other methods.
The main categories related to defining access rights in IT systems are [35]:
Entities – a unit capable of performing activities on the protected object. An entity can
be a user or another system and application executing various procedures on an object.
Typically, three entities are assumed: resource owner, group, and other users.
Objects – protected system resources.
Access rights – describe how an entity can control an object and include the following
categories: reading, writing, executing, deleting, creating, and searching.
The first step in creating the access control matrix is to define a set of entities that
relates directly to the system’s actors (see section 5.1). The set S of entities includes patients,
doctors, medical staff, pharmacies, insurance companies, and other SHSs. The set O of system
resources to be protected includes EHRs, smart contracts, and entities. Including entities in
protected system resources means that other entities can grant and revoke access rights to
entities.
read – data from EHRs stored in the blockchain and reading smart contracts,
write – adding data to the blockchain,
execute – execution of a smart contract,
delete – data deletion,
create – adding a smart contract to the blockchain,
search – searching data in the blockchain,
grant rights – granting entities access rights to EHRs;
revoke rights – removing access rights to EHRs from entities,
copy rights – copying access rights to EHRs to another entity.
Table 3 presents the access control matrix for resources of the SHS.
16
Table 3. Access control matrix
(set S)
EHRs Smart Contracts Entities
copy rights
Doctors, medical, and hospital read, search, read, create, delete, grant rights,
administrative staff write execute
revoke
rights,
copy rights
The access control matrix can be decomposed into columns for conversion into Access
Control Lists (ACL) [35]. Decomposition by rows defines permission tickets [35].
Smart contracts can describe objects, business processes, and even manage a business
domain. It is possible to define rules for managing any resources, objects and business
processes in smart contracts. However, before stakeholders can transact, a business model
must be defined that includes all processes, rules, and datasets. This paper demonstrates how
smart contracts can be used for issuing, fulfilling and confirming drug prescriptions in Smart
Healthcare Systems. Let’s assume that the analyzed process includes three entities: a doctor, a
patient and a pharmacy. The doctor issues a prescription to the patient, which contains
information about the medicines used. The patient can fill the prescription at any pharmacy
that verifies it and confirms its fulfillment. The doctor, the patient and the pharmacy can
verify the prescription on the blockchain. The smart contract pseudocode for issuing,
fulfilling, and verifying a prescription is presented in algorithms 1, 2 and 3.
17
ALGORITHM 1: ESTABLISHING A SMART CONTRACT IN THE APPLICATION LAYER
1
Initialization of objects and variables: patient, doctor, medications
2
patient ← constructor Patient ( patient_address )
3
doctor ← constructor Doctor ( doctor_address )
5
prescription ( patient, doctor, medications )
6
end
2 query ( medications )
3 get ( medications )
4 return ( medications )
5 end
6 query ( pharmacy )
7 get ( pharmacy )
8 return ( pharmacy )
9 end
18
11 query ( medications )
12 medications.buyer ← patient
13 medications.seller ← pharmacy
14 medications.doctor ← doctor
16 return transaction_id
17 end
2
transaction_id ← 𝑡 ∈ {𝑡1,…,𝑡𝑥}
3
signature ← { ( patient, doctor, medications, pharmacy ) & signatory }
4
end
5
response ( request ( patient, doctor, medications, pharmacy ) )
7 medications.doctor ← doctor }
8 signatures:
9 signed by a doctor
10 signed by a pharmacy
11
end
It should be noted that the implementation of smart contracts for medical processes
depends on the individual logic adopted in a given medical facility.
19
6. Empirical tests
Empirical tests allowed to assess the actual operation of the proposed solutions and
their behavior in various test scenarios and network load conditions. Conducting empirical
tests allowed to verify the stability of the network and assess performance. The
implementation of empirical tests required, among other things, the development of a test
environment, the implementation of the application engine in a chosen programming stack,
the definition of network configurations, the adoption of a methodology for empirical
research, and the analysis of the obtained results.
For the purposes of the research, a private blockchain network was constructed based
on the open-source platform, Hyperledger Fabric. A key advantage of the private blockchain
network is the enhanced protection of sensitive patient health data, as only authorized
stakeholders have access to the system. In contrast, the public blockchain is open to anyone
who wants to view transactions or implement smart contracts. For this reason, privacy in
public blockchains can be significantly limited. Therefore, instead of a public unauthorized
network where nodes with unknown identities can participate, our solution relies on
components being authorized by a trusted member service provider. Thus, all the transaction
processing nodes are authorized machines in the organization’s computer network. This
means that in the proposed architecture, sensitive medical data contained in EHRs, as well as
digital contracts concluded between stakeholders, are encrypted and shared only with
authorized entities.
The test environment included six nodes of the private blockchain network. The six-
node network was used to model a business structure involving two organizations with three
nodes in each. Peer nodes, order nodes, and channel nodes were then created in the designed
business domain. In addition, six nodes ensure high data redundancy and fault tolerance,
which is crucial for processing sensitive patient data. Computer units equipped with an i5-
9400 6x2.9 Ghz processor, 16 GB DDR4 2666 Mhz CL16 RAM and a 512 GB M.2 SATA3
SSD were used to build the network. The Ubuntu 20.04 LTS operating system was installed
on the computer units.
It should be noted that in the production environment, the number of nodes must meet
the needs and requirements of medical facilities.
Software engineering specifies that the choice of software architecture and technology
stack should be determined by the organization’s business requirements as well as the
functional and non-functional requirements of the system. In the context of SHSs, it is crucial
to consider cybersecurity, medical data privacy, network scalability, transaction processing
efficiency, compliance with applicable laws, compatibility with existing solutions,
interoperability and support for open-source solutions.
The Hyperledger Fabric framework was used as the core of the proposed solution due
to the possibility of flexible adaptation to business specifications and support for Java SDK.
CouchDB is the recommended database for the Hyperledger Fabric environment due to its
replication mechanisms. The gRPC and TLS protocols were chosen for communication
between nodes in the network due to their proven security.
20
The technology stack used in the test environment included, among others, the
following platforms, tools and architectural components:
In Table 4, the main components of the technology stack are presented along with the
justification for their selection, benefits for SHSs, and possible alternatives.
Hyperledger The platform enables the implementation of a private blockchain with Ethereum, Codra,
Fabric access control mechanisms. The solution provides access control to OpenChain,
medical data and authentication of individual network elements using Quorum
a trusted member service provider.
Hyperledger The ability to flexibly define transaction logic, validation rules, access SDK for Python,
Fabric Java SDK control policies, and node management in Java is important for SHSs Go, Node.js
that often have to adapt to specific requirements and needs.
Node.js
Maven The ability to integrate with Hyperledger Fabric Java SDK and Gradle, Apache
manage the application implementation process, in particular Buildr
dependencies, naming convention and versioning of application
modules.
Spring Boot Support for system interoperability through the implementation of Micronaut, Vert.x
RESTful API.
Docker Docker enables container virtualization and application isolation. An Kubernetes, CRI-
additional layer of encapsulation improves the security of medical
21
data. O, LXC Podman
Fabric Certificate Fabric CA offers many security features for secure certificate Let’s Encrypt,
Authority management. EJBCA
TSL The protocol is responsible for data confidentiality during SSL, IPSec, DTSL
transmission and authentication mechanisms.
gRPC The protocol is responsible for establishing a session for a given client Ethereum JSON-
identity. The returned object enables interaction with the blockchain RPC, Web3.js
and access to smart contracts.
Two smart contracts were implemented for the empirical tests in accordance with the
algorithms 1-3 proposed in the article, which implement the following business logic:
The sequence diagram for the execution of the smart contract A is shown in Figure 4.
22
Figure 4. Sequence diagram for the smart contract A.
The sequence diagram for the execution of smart contract the B is shown in Figure 5.
23
Source: Own work.
The definition of REST API endpoints for the examined smart contracts is as follows:
purpose: adding a new prescription for medications for a patient with a specific
identifier,
HTTP method: POST,
URL: /ehr/api/prescriptions-add,
authorization method: JWT token with information about the user’s permissions,
request structure: JSON format as defined in Document 3.
2
“patientID”: Object(Global Patient Identifier),
3
“doctorID”: Object(International Doctor ID),
4
“medicines”: [
5 {
6 “name: “aspirin”,
8 “duration: “5 days”
9 },
10 {
14 }
15
]
16
}
24
DOCUMENT 4: RESPONSE STRUCTURE FOR SMART CONTRACT A
1
{
2
“prescriptionID”: Object(Global Prescription Identifier),
3
“status”: “successfully added”
4
}
purpose: to fill a prescription for drugs for a patient with a specific identifier,
HTTP method: PUT,
URL: /ehr/api/prescriptions/{id}/execute
authorization method: JWT token with information about the user’s permissions,
request structure: JSON format as defined in Document 5.
2
“pharmacyID”: Object(PharmaID),
3
“prescriptionID”: Object(Global Prescription Identifier),
4
“timestamp”: “Thu Jan 12 2023 07:46:00 GMT+0000”
5
“medicines”: [
6 {
7 “name: “aspirin”,
8 “quantity: “2”,
9 “price: “4.55”
10 },
11 {
25
13 “quantity: “4”,
14 “price: “1.99”
15 }
16
]
17
}
2
“prescriptionID”: Object(Global Prescription Identifier),
3
“status”: “successfully completed”
4
}
Running the test environment requires the propagation of the network’s initial state,
which all nodes N1-N6 must know about. Then the genesis block was generated. The initial
state of the network was initialized with parameters in the crypto-config.yaml and
configtx.yaml files. The advantage of the Hyperledger Fabric platform is the ability to model
the business domain by defining consortia, organizations, member service providers,
channels, and certification authorities. Authorized blockchain network components use X.509
certificates to identify each other and confirm that they come from a trusted organization.
The structure of two medical organizations belonging to one consortium was modeled
for the empirical tests. The following assumptions were made in the research:
1. The business domain consists of two medical organizations, MedOrg1 and MedOrg2,
belonging to one medical consortium.
2. Three nodes were created for each organization: one ordering node and two peer
nodes.
3. A blockchain channel was created for each organization that contained only peer
nodes belonging to that organization.
4. A channel linking the MedOrg1 and MedOrg2 containing peer and ordering nodes was
established.
26
5. The Membership Service Provider was defined to implement the identification and
authentication of network elements for each organization to ensure the security of
medical data.
6. The blockchain network contains smart contracts for processing patients’ medical
data.
The modeled structure considers two medical organizations operating within one
consortium, which means that they have similar business goals and follow the rules defined in
a common business domain. Therefore, the established consortium defines the operating
framework for both medical organizations. However, each organization controls its data and
transactions processed on the blockchain network. The six-node structure ensures a higher
level of data redundancy in the network and better resistance to potential failures.
Orderer node settings are also critical during network initialization. In particular,
values for address, time, and packet_size must be specified. The BatchTimeout,
MaxMessageCount and AbsoluteMaxBytes parameters were adjusted to the conditions of the
test environment and were set to 2s, 10, 99MB, respectively.
The implementation of empirical tests required the definition of test objectives, test
cases and the adoption of metrics used during the experiment.
Assessing the stability involves studying the behavior of the network under generated
load within a specified time horizon. Performance evaluation estimates how many
transactions the tested architecture can process within a given time frame. The performance
tests included multiple scenarios with various data sizes defined for the processed
transactions.
The stability assessment involved examining the network’s behavior under generated
load within a specified time horizon. The performance evaluation estimated how many
transactions the tested network could process within a given time frame and the delay in
transaction processing. Performance tests encompassed multiple scenarios with varying data
sizes for the processed transactions.
The study defined one test case for each test objective. The basic stability assessment
test case includes simulated network load generation, logging the number of network failures
along with the duration of incidents.
27
number of sessions: 10 - 500.
Based on the methodology adopted by Roehrs et al. [27], the study used the following
metrics to assess network stability:
The performance evaluation test case involved a transaction between a patient and two
medical organizations using the proposed nested tree structure for EHRs.
The network configured according to the presented initial parameters was launched
according to the stability assessment test scenario for ten consecutive days, i.e., 240 hours.
During the study, stress tests were performed once a day according to the parameters
specified in the test scenario, increasing the number of simultaneous sessions from 10 to 500.
The obtained measurements made it possible to determine the MTBF metric, which amounted
to 15.8667 and the MTTR metric, which amounted to 0.1334. Based on the MTBF and MTTR
metrics, the system availability (A) was estimated, which in the analyzed period amounted to
0.9917. During the stability assessment, the average utilization of hardware resources was
also estimated. The obtained results are presented in table 5.
28
Hardware resources 10 sessions 200 sessions 500 sessions
In turn, the performance evaluation test scenario evaluates the execution of the smart
contracts per 1000 sessions. Based on the analysis of the collected metric values (latency, TPS
value and hardware resource consumption), the performance of the blockchain network can
be assessed at various block sizes, i.e., 8 KB, 16 KB and 32 KB. Tables 6 and 7 show the
obtained values of network performance metrics for 1000 sessions.
Table 6. Results for the performance evaluation test scenario – smart contract A
Avg
Block Min Latency Max Latency CPU Memory
Succ Fail TPS Latency
size (ms) (ms) (%) (MB)
(ms)
Table 7. Results for the performance evaluation test scenario – smart contract B
Avg
Block Min Latency Max Latency CPU Memory
Succ Fail TPS Latency
size (ms) (ms) (%) (MB)
(ms)
29
16 KB 1000 0 33 20 301 206 43 1340
Figures 6 and 7 show the average processing latency of the smart contacts with
different block sizes.
350
Avg Latency (ms)
300
250
200
150
100
50
0
0 100 200 300 400 500 600 700 800 900 1000
Sessions
8 KB 16 KB 32 KB
300
Avg Latency (ms)
250
200
150
100
50
0
0 100 200 300 400 500 600 700 800 900 1000
Sessions
8 KB 16 KB 32 KB
The results of the study indicate that the TPS value decreases as the block size
increases.
The resource consumption of nodes increases with the block size. It should be noted that the
processing performance for smart contract B is higher than for smart contract A. This might
stem from the fact that smart contract A is more write-oriented than smart contract B. Reading
data is typically less complex at the smart contract level than writing data at the I/O level,
30
leading to faster transaction processing. The analysis of the latency metric indicates that the
average latency increases with the increase in block size and number of sessions, which
negatively affects the TPS factor. The average session latency for the smart contract A is
between 200 and 300 ms and for the smart contract B it is around 150-250 ms, depending on
the block size and number of sessions. The performance of the tested network depends on the
block size and the type of smart contracts. With many simultaneous sessions and complex
transactions, memory and CPU usage are critical, which can negatively impact network
performance.
Race attack The attack involves replacing the first transaction with another one before the
original transaction is written to the blockchain.
51% attack The attacker possesses over 50% of the computational power of the network’s
security nodes. Therefore, it is possible to take control of the blockchain network by
manipulating transactions.
Eclipse attack The attack isolates the user or node and redirects the victim’s connections to nodes
controlled by the attacker. The attack may be preceded by flooding the victim with
the attacker’s IP addresses and a DoS attack to force a node restart. As a result, the
attacker can manipulate the node and generate unauthorized transaction
confirmations.
Sybil attack The attack involves creating and maintaining multiple nodes in the blockchain
network. In the case of PoS algorithms, the attacker can vote for trusted nodes,
sabotage the network, and reject block verification.
Finney attack The attack occurs when a user accepts an unconfirmed transaction. In a typical
scenario, the attacker has two addresses. The attacker can send a transaction between
these addresses and then lock the transaction. In the next step, the attacker sends a
transaction to another user’s addresses. If the user accepts the unconfirmed
transaction, the attacker releases the initial transaction lock.
DoS and The attack blocks network services and can be carried out using various attack
31
DDoS attacks vectors, including buffer overflow attack, SYN flood attack and ICMP flood attack.
Routing attack The attack exploits vulnerabilities in the Internet infrastructure to manipulate routing
tables. The attack is carried out at the level of the Internet Service Provider. Based
on the BGP protocol, blockchain networks are partitioned to create disconnected
subnets. As a result, the propagation of new blocks may be delayed.
Replay attack The attack involves the interception and retransmission of data. The attack is feasible
if a hard fork splits the network. If a transaction validated in the initial blockchain is
also valid in the new blockchain, it can be transferred from the first blockchain to the
second.
The research used the steps recommended by ENISA for identification, analysis and
evaluation [6], [7] and elements of the methodology developed by NIST [21]. The impact of
the threat on the SHS was rated on a scale of 1 to 5. The likelihood of a given threat occurring
in the identified system vulnerability was also estimated on a scale of 1 to 5.
The adopted assumptions were used to determine the risk score in accordance with the
following formula:
𝑅=𝐼∗𝐿 (2)
key:
R – risk score,
𝐼 ∈ {1,2,3,4,5} – coefficient of the estimated impact of the identified threat on the Smart
Healthcare System,
The adopted impact and likelihood levels made it possible to develop the risk matrix
presented in Table 8.
Impact levels
Likelihood levels
Very low Low Medium High Very high (5)
32
(1) (2) (3) (4)
High (4) 4 8 12 16 20
Medium (3) 3 6 9 12 15
Low (2) 2 4 6 8 10
Based on the risk matrix and the obtained values of the risk ratio, the following risk
levels were determined:
Risk analysis and evaluation was conducted based on determined levels. The research
results are presented in Table 10. The table also includes risk minimization strategies.
Table 10. Risk analysis and evaluation with risk minimization strategies
Risk
Score
Impact Likelihood
Cyberattack Risk minimization strategies
(I) (L)
(R = I x
L)
33
Sybil attack 5 4 20 Firewall configuration policies should include
blocking inbound and outbound connections for
(high) untrusted nodes.
Table 9 shows that the critical threats to the blockchain in SHSs are the Eclipse attack,
Sybil attack, and both DoS and DDoS attacks. The key protection strategies against identified
threats include ensuring the security of network nodes, defining the rules for creating new
blocks and proactively monitoring network traffic statistics for early detection of attacks. As
demonstrated in the article, blockchain technology improves the security of medical data and
healthcare stakeholders as well as supports the interoperability of SHSs. However, the
implementation of new software architecture concepts in healthcare brings new risks and
vulnerabilities that must be addressed early. Based on the results of the risk analysis, the main
guidelines for risk migration plans for blockchain technology in healthcare were formulated:
1. Risk analysis: the system design phase should be preceded by a complete and detailed
risk assessment. Threats and vulnerabilities must be identified, taking into account the
confidentiality, availability and integrity of medical data.
2. Authorization: blockchain technology provides a high level of security thanks to a
distributed architecture based on cryptographic proofs. However, it may be subject to
problems with identifying and authenticating users and network components,
especially on public networks. It is crucial to develop secure authorization
mechanisms for stakeholders and network components.
3. Technology stack: the software architecture stack should be determined by the
functional and non-functional requirements resulting from the logic of medical
34
processes. Security, interoperability, performance, scalability and compliance are key
considerations.
4. Standardization: undertaking global standardization initiatives to implement
blockchain technology in healthcare minimizes risk, promotes good practice, and
increases compatibility and interoperability.
5. Education: promoting educational activities and training in the safe use of blockchain
technology by medical staff and patients.
6. System testing: stringent requirements for the reliability of IT systems in medicine
require an advanced software testing strategy before the system goes into the
production environment.
7. Continuous improvement: regular system security audits will help identify and
minimize risks and eliminate vulnerabilities that may occur during system operation.
A holistic risk migration plan should include a set of interrelated steps to ensure safe
system use by all healthcare stakeholders.
8. Discussion
The discussion in this section provides a critical analysis of the research results. The
results presented in this article cover a multi-stage research process. The first step was to
develop an IoMT architecture for SHSs. The model was developed based on the concepts of
layered IoT architecture available in the literature. The layered approach ensured compliance
with general IoT concepts and extended the model with functionalities related to medical
processes. In particular, the model considers cybersecurity as a systemic element.
In the next research step, the technical architecture framework of the blockchain
network for SHSs was developed. The presented concept contains many synergistic elements
and aims to support the recommendations in international strategies for developing digital
healthcare. The recommendations concern, inter alia, unifying the structure of medical data,
improving interoperability and ensuring cybersecurity of medical processes. To meet the
above postulates, this paper presents an open data exchange format for EHRs embedded in the
blockchain. The universal nested tree notation according to the DOM interface was used in
the research.
The research results support the concept presented by Thuy et al. [40] for the semantic
transformation of XML medical data into the OWL ontology. Embedding EHRs in the
blockchain and basing their structure on a nested tree enables the use of universal
transformation methods based on the XML format. Moreover, the reference to the alternative
JSON format supported interoperability from the programming side. In particular, it is
possible to implement modern RESTful JSON APIs for remote procedure call services. The
open-source gRPC platform enables the implementation of a remote procedure call protocol
using the http/2, Protobuf, and streaming protocols to create high-performance real-time
services [20]. The gRPC platform supports, among others, Go, C++, Java, Python, C#.
Additionally, there are development platforms available for creating full technology stacks for
a web-based JSON API using gRPC services. For instance, gRPC JSON transcoding is an
extension of ASP.NET Core for crafting modern RESTful JSON APIs for gRPC services
[20]. Therefore, using the indicated programming tools, it is possible to create modern APIs
supporting interoperability based on the architecture framework of the SHS presented in this
paper. It should be noted that this is particularly important in software backend programming.
35
The next important research step was to define algorithms for concluding, approving
and validating transactions between stakeholders of medical processes based on smart
contract cryptographic evidence. In this paper, contracts between stakeholders of medical
processes are transformed into executable programs. Smart contracts can describe any
business process and define resource management rules. The study used the access control
matrix method to define access rights for entities and objects. The obtained results correspond
to the research of Sookhak et al. [34], which evaluated smart contracts in terms of access
control in healthcare. It should be noted that in systems based on blockchain technology and
smart contracts, there may be some difficulties in revoking user privileges [34]. To counteract
this, the ABE, IBE methods and the lazy revocation cryptosystem are used [34].
The next research step involved empirical tests to assess the stability and performance
of the proposed architecture. For the purposes of empirical tests, the software was
implemented in a selected architectural stack. Test objectives, test scenarios, and metrics were
defined in the study. The empirical tests evaluated two smart contracts concluded between the
patient, the doctor and the pharmacy regarding the issuance and fulfillment of a prescription.
In the latest literature, there are also innovative concepts and prototypes of the use of
blockchain technology in the medical industry. For the purposes of the discussion,
publications on the practical applications of blockchain technology in healthcare and medical
data security were selected.
Sharma et al. [33] published research findings on the use of blockchain technology to
issue unique identifiers for medical certificates. The study showed the effective use of smart
contracts for user registration, generation of medical certificates and their verification.
Although the authors used a different Ethereum-based platform, the conclusions of the
research are similar. Blockchain technology provides more secure processing of EHRs than
currently used centralized systems. The research results presented by Sharma et al. [33] may
be complementary to the research findings of this paper in implementing various smart
contract scenarios for EHRs in a nested tree structure.
The key study was also published by Sammeta and Parthiban [28], who developed a
machine learning-based model for diagnosing diseases. The machine learning algorithm
extracted data from the Hyperledger Fabric-based blockchain. The results of the study
indicate the high efficiency of the algorithm in the diagnosis of diseases [28]. The results of
the discussed article may synergistically complement this paper in terms of data formats and
smart contract algorithms, as well as software implementation in the presented architectural
stack. Machine learning algorithms and blockchain technology can be extended with the EHR
format based on the nested tree structure, which offers an additional layer of semantics for
artificial intelligence techniques.
In another study, Vazirani et al. [42] emphasized that the IT systems currently used in
the medical industry have significant interoperability gaps, which leads to dangerous
situations in healthcare. The research results of the discussed article indicate that blockchain
supports the interoperability of medical records management [42]. To improve
interoperability, our solution recommends the use of global identifiers for patients, doctors
and medical facilities. It is also worth noting the research findings published by Qu et al. [24],
in which the authors emphasize that quantum computers can threaten the security of
blockchain technology. The identified issues require urgent research.
9. Conclusions
36
The development of SHSs is an open and interdisciplinary research challenge. The
presented blockchain implementation architecture for SHSs addresses the open challenges
defined in international digital healthcare development strategies. The defined IoMT
architecture model takes into account the requirements for cybersecurity, interoperability and
supports the processing of medical data. Full interoperability of SHSs cannot be achieved
without open formats for medical data exchange. The article presents the structure of an open
data exchange format for EHRs based on the nested tree model. The proposed structure is
hardware and software independent. Medical data processing is conducted using algorithms
secured by the cryptographic proof of the blockchain. For this purpose, algorithms for
concluding, approving and validating transactions are presented. The conducted empirical
tests showed high stability and performance of the proposed architecture in various test
scenarios. The risk analysis identified possible threats and vulnerabilities of using blockchain
in SHSs.
10. References
[1] Aggarwal S, Kumar N. (2021). Chapter Twenty - Attacks on blockchain, in: S. Aggarwal,
N. Kumar, P. Raj (Eds.), Advances in Computers, pp. 399-410.
https://doi.org/10.1016/bs.adcom.2020.08.020
[3] Deepa N, Pham Q-V, Nguyen DC, Bhattacharya S, Prabadevi B, Gadekallu TR,
Maddikunta PKR, Fang F, Pathirana PN. (2022). A survey on blockchain for big data:
Approaches, opportunities, and future directions. Future Generation Computer Systems, 131,
pp. 209-226. https://doi.org/10.1016/j.future.2022.01.017
[4] Ding, W., Abdel-Basset, M., Hawash, H., & Pedrycz, W. (2023). MIC-Net: A deep
network for cross-site segmentation of COVID-19 infection in the fog-assisted
IoMT. Information Sciences, 623, 20–39. https://doi.org/10.1016/j.ins.2022.12.017
[5] Feng, X., Wu, J., Wu, Y., Li, J., & Yang, W. (2023). Blockchain and digital twin
empowered trustworthy self-healing for edge-AI enabled industrial Internet of
things. Information Sciences, 642(119169), 119169. https://doi.org/10.1016/j.ins.2023.119169
37
[7] ENISA. (2022). Compendium of Risk Management Frameworks with Potential
Interoperability. https://www.enisa.europa.eu/publications/compendium-of-risk-management-
frameworks (accessed 26 June 2022).
[11] IEEE. (2018). Standard for a Reference Architecture for Smart City (RASC).
https://standards.ieee.org/ieee/2413.1/7331/ (accessed 10 June 2022).
[12] Javaheri D, Gorgin S, Lee J-A, Masdari M. (2023). Fuzzy logic-based DDoS attacks and
network traffic anomaly detection methods: Classification, overview, and future
perspectives. Information Sciences, 626, 315–338. https://doi.org/10.1016/j.ins.2023.01.067
[13] Khan M, Mehran MT, Haq ZU, Ullah Z, Naqvi SR, Ihsan M, Abbass H. (2021).
Applications of artificial intelligence in COVID-19 pandemic: A comprehensive review.
Expert Systems with Applications, 185, 115695. https://doi.org/10.1016/j.eswa.2021.115695
[14] Kumar NM, Mallick PK. (2018). The Internet of Things: Insights into the building
blocks, component interactions, and architecture layers. Procedia Computer Science, 132, pp.
109-117. https://doi.org/10.1016/j.procs.2018.05.170
[15] Liu X, Liu Q, Peng T, Wu J. (2017). Dynamic access policy in cloud-based personal
health record (PHR) systems. Information Sciences, 379, 62–81.
https://doi.org/10.1016/j.ins.2016.06.035
[16] Lu, X. (2023). Implementation of art therapy assisted by the internet of medical things
based on blockchain and fuzzy set theory. Information Sciences, 632, 776–790.
https://doi.org/10.1016/j.ins.2023.03.044
[17] Lu, Y., Wang, C., Yue, M., & Wu, Z. (2023). Consumer-source authentication with
conditional anonymity in information-centric networking. Information Sciences, 624, 378–
394. https://doi.org/10.1016/j.ins.2022.12.051
[19] Naseer Qureshi K, Din S, Jeon G, Piccialli F. (2020). An accurate and dynamic
predictive model for a smart M-Health system using machine learning. Information Sciences,
538, pp. 486–502. https://doi.org/110.1016/j.ins.2020.06.025.
38
[20] Newton-King J, Microsoft, gRPC JSON transcoding. https://docs.microsoft.com/pl-
pl/aspnet/core/grpc/httpapi, 2022 (accessed 19 June 2022).
[22] Pedrycz, W. (2023). Autonomous and sustainable machine learning: pursuing new
horizons of intelligent systems. AI and Autonomous Systems, 2023(1): 0002.
https://doi.org/10.55092/aias20230002
[23] Qi, P., Chiaro, D., Giampaolo, F., & Piccialli, F. (2023). A blockchain-based secure
Internet of medical things framework for stress detection. Information Sciences, 628, 377–
390. https://doi.org/10.1016/j.ins.2023.01.123
[24] Qu, Z., Zhang, Z., & Zheng, M. (2022). A quantum blockchain-enabled framework for
secure private electronic medical records in Internet of Medical Things. Information
Sciences, 612, 942–958. https://doi.org/10.1016/j.ins.2022.09.028
[25] Quamara, S., & Singh, A. K. (2022). A systematic survey on security concerns in
cryptocurrencies: State-of-the-art and perspectives. Computers & Security, 113(102548),
102548. https://doi.org/10.1016/j.cose.2021.102548
[26] Ramos S, Pianese F, Leach T, Oliveras W. (2021). A great disturbance in the crypto:
Understanding cryptocurrency returns under attacks. Blockchain: Research and Applications.
2,3, 100021. https://doi.org/10.1016/j.bcra.2021.100021
[27] Roehrs, A., da Costa, C. A., da Rosa Righi, R., da Silva, V. F., Goldim, J. R., & Schmidt,
D. C. (2019). Analyzing the performance of a blockchain-based personal health record
implementation. Journal of Biomedical Informatics, 92(103140), 103140.
https://doi.org/10.1016/j.jbi.2019.103140
[28] Sammeta, N., & Parthiban, L. (2022). Hyperledger blockchain enabled secure medical
record management with deep learning-based diagnosis model. Complex & Intelligent
Systems, 8(1), 625–640. https://doi.org/10.1007/s40747-021-00549-w
[29] Sanda, O., Pavlidis, M., Seraj, S., & Polatidis, N. (2023). Long-Range attack detection on
permissionless blockchains using Deep Learning. Expert Systems with
Applications, 218(119606), 119606. https://doi.org/10.1016/j.eswa.2023.119606
[30] Saripalle R, Runyan C, Russell M. (2019). Using HL7 FHIR to achieve interoperability
in patient health record. Journal of Biomedical Informatics, 94, 103188.
https://doi.org/10.1016/j.jbi.2019.103188
[31] Saxena S, Bhushan B, Ahad MA. (2021). Blockchain based solutions to secure IoT:
Background, integration trends and a way forward. Journal of Network and Computer
Applications, 181, 103050. https://doi.org/10.1016/j.jnca.2021.103050
[32] Sethi P, Sarangi SR. (2017). Internet of Things: Architectures, Protocols, and
Applications. Journal of Electrical and Computer Engineering, 9324035.
https://doi.org/10.1155/2017/9324035
39
[33] Sharma, P., Namasudra, S., Gonzalez Crespo, R., Parra-Fuente, J., & Chandra Trivedi,
M. (2023). EHDHE: Enhancing security of healthcare documents in IoT-enabled digital
healthcare ecosystems using blockchain. Information Sciences, 629, 703–718.
https://doi.org/10.1016/j.ins.2023.01.148
[34] Sookhak M, Jabbarpour MR, Safa NS, Yu FR. (2021). Blockchain and smart contract for
access control in healthcare: A survey, issues and challenges, and open issues. Journal of
Network and Computer Applications, 178, 102950.
https://doi.org/10.1016/j.jnca.2020.102950
[35] Stallings W & Brown L (2018). Computer Security: Principles and Practice, 4th Edition,
Pearson
[37] Swarna Priya RM, Maddikunta PKR, Parimala M, Koppu S, Gadekallu TR, Chowdhary
CL, Alazab M. (2020). An effective feature engineering for DNN using hybrid PCA-GWO
for intrusion detection in IoMT architecture. Computer Communications, 160, pp. 139-149.
https://doi.org/10.1016/j.comcom.2020.05.048
[38] Szabo N. (1996). Smart Contracts: Building Blocks for Digital Markets.
https://www.fon.hum.uva.nl/rob/Courses/InformationInSpeech/CDROM/Literature/LOTwinte
rschool2006/szabo.best.vwh.net/smart_contracts_2.html (accessed 10 June 2022).
[39] Szczepaniuk H, Szczepaniuk EK. (2021). Cybersecurity Management within the Internet
of Things, in: S.K. Sharma, B. Bhushan, N.C. Debnath, (Eds.), IoT Security Paradigms and
Applications: Research and Practices. Taylor & Francis CRC Press, pp. 24-41.
https://doi.org/10.1201/9781003054115
[40] Thuy PTT, Lee Y-K, Lee S. (2021). S-Trans: Semantic transformation of XML
healthcare data into OWL ontology. Knowledge-Based Systems, 35, pp. 349-356.
https://doi.org/10.1016/j.knosys.2012.04.009
[41] Tomar D, Bhati JP, Tomar P, Kaur G. (2019). Chapter 2 - Migration of healthcare
relational database to NoSQL cloud database for healthcare analytics and management, in: N.
Dey, A.S. Ashour, C. Bhatt, S.J. Fong (Eds.), Advances in ubiquitous sensing applications for
healthcare, Healthcare Data Analytics and Management, Elsevier Academic Press, pp. 59-87.
https://doi.org/10.1016/B978-0-12-815368-0.00002-6
[42] Vazirani, A. A., O’Donoghue, O., Brindley, D., & Meinert, E. (2020). Blockchain
vehicles for efficient Medical Record management. Npj Digital Medicine, 3(1), 1.
https://doi.org/10.1038/s41746-019-0211-0
[43] Voundi Koe, A. S., Ai, S., Chen, Q., Tang, J., Chen, K., Zhang, S., & Li, X. (2023).
Hieraledger: Towards malicious gateways in appendable-block blockchain constructions for
IoT. Information Sciences, 632, 87–104. https://doi.org/10.1016/j.ins.2023.02.077
[44] Wang, J., Jin, H., Chen, J., Tan, J., & Zhong, K. (2022). Anomaly detection in Internet of
medical Things with Blockchain from the perspective of deep neural network. Information
Sciences, 617, 133–149. https://doi.org/10.1016/j.ins.2022.10.060
40
[45] Wen, B., Wang, Y., Ding, Y., Zheng, H., Qin, B., & Yang, C. (2023). Security and
privacy protection technologies in securing blockchain applications. Information
Sciences, 645(119322), 119322. https://doi.org/10.1016/j.ins.2023.119322
[46] Woody SK, Burdick D, Lapp H, Huang ES. (2020). Application programming interfaces
for knowledge transfer and generation in the life sciences and healthcare. npj Digital
Medicine, 3,24. https://doi.org/10.1038/s41746-020-0235-5
[47] World Economic Forum. (2016). White Paper Digital Transformation of Industries:
Healthcare Industry. In collaboration with Accenture. https://report.weforum.org/digital-
transformation/wp-content/blogs.dir/94/mp/files/pages/files/dti-healthcare-industry-white-
paper.pdf (accessed 19 August 2023)
[48] Yan, F., Huang, H., Pedrycz, W., & Hirota, K. (2023). Automated breast cancer detection
in mammography using ensemble classifier and feature weighting algorithms. Expert Systems
with Applications, 227(120282), 120282. https://doi.org/10.1016/j.eswa.2023.120282
41
42
43
44
45
CRediT authorship contribution statement
46